THIRD PARTY AND SUPPLY CHAIN THREAT VECTORS Flashcards

1
Q

Third party

A

Includes vendors, managed services providers, business partners, consultants,contractors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Supply chain

A

Entire ecosystem of organizations, processes, people and resources involved in providing a product or service.
Represents steps to get product from inception to end user.
Challenge: organization does not have direct relationship or communication to supply chain providers and it is dependent on upon vendors to have those relationships.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

System spawl

A

Used to describe unmanaged growth. Is often a result of non-standardization and/or decentralization. Multiple vendors, incompatible platforms, unmanaged growth. Impact is - inability to enforce security requirements
Response: proper configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

EOS - end of support

A

Last date to receive applicable service and support

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Dependency

A

This is the state of relying or being controlled by someone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Non-conformance

A

Not fulfilling requirements of policies, unauthorized changes, untested product, implementation, missing critical documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EOL end of life

A

Threat vector . This is sate when the product, service or subscription is determined to be obsolete. Causes vulnerabilities, can be opportunistic attack targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SLA service level agreement

A

Agreement to codify service and support agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ISA - interconnection security agreement

A

Document that regulates security relevant aspects of an intended connection between an agency and external system. It also documents technical requirements and responsibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Disruption

A

Interruption of normal business operations due to cyber attack or data breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fourth party

A

That are vendors that are vendors for third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Inherent risk in 3rd parties

A

Threat vectors which manifest risk to the organization, consequences can be: financial loss, reputation,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Supply chain dependency

A

Relying only on one vendor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly